From The Blog
-
Bring on the Ransomware Beta Test as Royal Begins Seems to be testing a New Encryptor called BlackSuit
Written by Sean KalinichThe fine folks at the Royal ransomware group have begun testing a new flavor of encryptor that is being called BlackSuit (The hat was already…Written on Thursday, 08 June 2023 16:03 in News Read 359 times Read more...
-
Google and Microsoft Share a Zero Day as both Chrome and Edge get Patch Now Guidance.
Written by Sean KalinichGoogle has pushed out a new patch for Chrome to deal with a zero-day vulnerability tracked as CVE-2023-3079. In the patch release Google is clear…Written on Thursday, 08 June 2023 15:12 in News Read 331 times Read more...
-
Barracuda Email Security Gateway Appliances that were Exploited due to Zero-Day Must Be Replaced, not Patched
Written by Sean KalinichAfter the disclosure of a serious Zero-Day that allowed an unauthenticated user to basically own the device. Barracuda is now saying that remediation action for…Written on Thursday, 08 June 2023 12:33 in News Read 216 times Read more...
-
Minecraft Mods stuffed with Malware Used to Target Windows and Linux
Written by Sean KalinichAs we hear more about Supply Chain attacks and the need for Software Build of Materials we are now hearing of an attack on the…Written on Wednesday, 07 June 2023 15:24 in News Read 292 times Read more...
-
Sextortionists Get a Boost from AI and Publicly Available Images
Written by Sean KalinichAs if the internet needed something else bad floating around it seems that groups that engage in extortion schemes involving the threat of releasing images…Written on Wednesday, 07 June 2023 14:24 in News Read 216 times Read more...
-
New PowerShell Malware Dubbed PowerDrop used to Target US Aerospace Industry
Written by Sean KalinichIt is Wednesday, so it is about time to talk about a new strain of malware. In this case one that leverages Microsoft’s PowerShell to…Written on Wednesday, 07 June 2023 13:31 in News Read 197 times Read more...
-
More Ransomware as a Service Fun as Cyclops Gang Now Offers Value Add Information Stealer
Written by Sean KalinichAnyone that does not think that cybercrime is now a bug business has been living under a rock. The news related to different cybercrime-as-a-service groups,…Written on Tuesday, 06 June 2023 15:08 in News Read 462 times Read more...
-
Why SBOM is in the News and Why it is Important
Written by Sean KalinichSince Executive Order 14028 came out on May 12th from the Biden Administration there has been a lot of talk about what it means and…Written on Tuesday, 06 June 2023 11:43 in Security Talk Read 109 times Read more...
-
Attackers Drop Card Stealing Scripts into Legitimate eCommerce Sites
Written by Sean KalinichSo, there you are, you have found the one thing in all the internet that will make your object drive life complete. You put the…Written on Monday, 05 June 2023 15:10 in News Read 857 times Read more...
Recent Comments
- Sean, this is a fantastic review of a beautiful game. I do agree with you… Written by Jacob 2023-05-19 14:17:50 Jedi Survivor – The Quick, Dirty, and Limited Spoilers Review
- Great post. Very interesting read but is the reality we are currently facing. Written by JP 2023-05-03 02:33:53 The Dangers of AI; I Think I Have Seen this Movie Before
- I was wondering if you have tested the microphone audio frequency for the Asus HS-1000W? Written by Maciej 2020-12-18 14:09:33 Asus HS-1000W wireless headset impresses us in the lab
- Thanks for review. I appreciate hearing from a real pro as opposed to the blogger… Written by Keith 2019-06-18 04:22:36 The Red Hydrogen One, Possibly One of the Most “misunderstood” Phones Out
- Have yet to see the real impact but in the consumer segment, ryzen series are… Written by sushant 2018-12-23 10:12:12 AMD’s 11-year journey to relevance gets an epic finish.
Most Read
- Microsoft Fail - Start Button Back in Windows 8.1 But No Start Menu Written on Thursday, 30 May 2013 15:33 in News Be the first to comment! Read 115118 times Read more...
- We take a look at the NETGEAR ProSafe WNDAP360 Dual-Band Wireless Access Point Written on Saturday, 07 April 2012 00:17 in Pro Storage and Networking Be the first to comment! Read 84233 times Read more...
- Synology DS1512+ Five-Bay NAS Performance Review Written on Tuesday, 12 June 2012 20:31 in Pro Storage and Networking Be the first to comment! Read 78431 times Read more...
- Gigabyte G1.Sniper M3 Design And Feature Review Written on Sunday, 19 August 2012 22:35 in Enthusiast Motherboards Be the first to comment! Read 77790 times Read more...
- The Asus P8Z77-M Pro Brings Exceptional Performance and Value to the Lab Written on Monday, 23 April 2012 13:02 in Consumer Motherboards Be the first to comment! Read 67371 times Read more...
Displaying items by tag: Hacking
Ransomware Group RA Group Is Open for Business in the US and South Korea
There is a new player in the ransomware space. Dubber RA group this new organization appears to have had their grand opening last month (April 2023). RA Group published a data leak site on the dark web as part of the now all too familiar double extortion scheme that most ransomware brings to the table. RA Group is also one of the organizations that has leveraged the Babuk source code links to get things going, as reported by Cisco Talos.
The Greatness Phishing as a Service Platform Intended to Make Targeting MS365 Easier
There is an old saying that says, when you can no longer do, you teach. This might be a relatively true axiom in the regular world, but in the world of cybercrime it is certainly not what you find happening. Instead, we tend to see that when organized groups no longer want the headache and hassle of doing the heavy lifting for attacks, they just build a platform to sell their tools to others. We have seen ransomware as a service, malware as a service, malvertising as a service, and even phishing as a service.
PC Component Maker MSI has Private Code Signing Keys Leaked **Updated**
Updated May-08-2023 with statement from Intel
Back in early April MSI, a popular PC and PC component maker, disclosed that it had a security incident. They stated that they quickly rolled out their Incident Response Team and enacted their recovery procedures (IR and BC/DR plans). Not much was known about the attack at the time, including when the incident happened, just that the disclosure was made to the relevant authorities.
New Cactus Ransomware Uses Encrypted 7-Zip to Get Around Detection
Ransomware is a pain in the ass, no matter what type it is. You have a piece of code that comes in, encrypts all your files, steals them and then you must deal with paying a ransom of some sort to either get your files back or prevent potential disclosure of sensitive information. It is not exactly what you want to deal with on a given day. So, when a new method of deploying ransomware pops up you can excuse our thinking “oh what fresh hell is this”.
Try2Check Dismantled by Authorities, $10M Reward Posted for its Creator
There you are doing your stollen credit card number shopping, like you do every Sunday. You come across a big batch of them, and the deal seems good. How do you know these things are real? I mean this isn’t exactly Amazon with reviews and a return policy. This is a dark web marketplace. The answer to your dilemma is to use a card checking service. One of, if not the, most popular services on the darker side of the web was Try2Check. I say was since this system was taken down by the US Government this week in what has been described as a multi-national operation.
Double DLL Sideloading, it’s a Thing as Attackers Grow More Sophisticated
DLL sideloading is a common technique for attackers to use when getting their malware in place and has been in use since around 2010. Simply put your malicious DLL in the same directory as the application and Windows in all its helpfulness loads it first instead of the legitimate one that might be in another directory. This method is also referred to as DLL search order hijacking. With the age of this technique and advances in EDR/MDR its usefulness has decreased.
Open Source Takes Another Hit as 3rd Protestware Shows up in NPM Repository
The Open Source community has been one that many leverage to help build their applications. It has become a great place to find applications packages that make building out a larger application or eco systems less time consuming. We see this in just about every development space from large to small. Having helpful sources of working code can speed up the development lifecycle and allow for greater interoperability as many applications use the same dependencies and core functions. The open source community is a great resource and typically is one that you can trust to pull code from.
The Risks, the Crime, and the Illusions of Blockchain or Decentralized Networks.
Blockchain, the immutable public transaction log where many say the future lies and the concept of “code is law” is often bandied about. However, the bank ending utopian promise of block chain and web3.0 has not exactly arrived and it is not as “de”centralized as it was supposed to be. Instead, the power and control of blockchain technologies, especially when is comes to currencies involved have been concentrated in a few groups while theft, scams and crime seem to be the most common things you read about it. So, what happened? The concept of Web 3.0 was not supposed to be like this.
Hacking Groups that Plant Fake Evidence Identified in Trukey and India, Where Else are They?
SentinelOne’s threat team has been tracking a couple of threat groups with an unusual goal. These groups are not looking to steal money or get a ransom, instead they are looking to track, monitor and incriminate specific targets. The targets that have been identified so far have been journalists and activists that oppose government practices. So far, the countries where these groups have been identified are limited to India and Trukey but if threat groups like this have been found there, it is likely they are everywhere.
Recent North Korean Internet Outages Potentially Caused by One Person with a Grudge
In early January 2021 North Korean hackers were in the midst of a campaign targeting western security researchers. They were looking to gather tools, vulnerability information and anything else of value they could get. The US, after learning about this attack did not have a significant response to the threat. Of course, the country was going through a bit of a political turmoil at the time, but there still should have been some sort of response to help prevent further attacks.